New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

BCS CISMP-V9 Exam - Topic 1 Question 62 Discussion

Actual exam question for BCS's CISMP-V9 exam
Question #: 62
Topic #: 1
[All CISMP-V9 Questions]

What are the different methods that can be used as access controls?

1. Detective.

2. Physical.

3. Reactive.

4. Virtual.

5. Preventive.

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Joye
3 months ago
Not sure about virtual access being a method.
upvoted 0 times
...
Man
3 months ago
Totally agree with C, those are essential methods.
upvoted 0 times
...
Jaclyn
4 months ago
Wait, reactive controls? Are those really a thing?
upvoted 0 times
...
Dorothy
4 months ago
I think physical access is super important too.
upvoted 0 times
...
Serina
4 months ago
Detective and preventive are key!
upvoted 0 times
...
Matthew
4 months ago
I’m a bit confused about what virtual access controls entail. Is that really a separate category?
upvoted 0 times
...
Rachael
4 months ago
I feel like I've seen a question like this before, and I think the correct answer might include 1, 2, and 5.
upvoted 0 times
...
Roy
5 months ago
I remember studying physical and preventive controls, but I can't recall if reactive is a common category.
upvoted 0 times
...
Jovita
5 months ago
I think access controls include preventive methods, but I'm not sure about the detective ones.
upvoted 0 times
...
Shenika
5 months ago
I think I know the answer to this one. Physical, virtual, and preventive controls seem to be the most common methods. I'll go with that and hope I'm right.
upvoted 0 times
...
Katie
5 months ago
Okay, I've got this. Physical, virtual, and preventive controls are pretty clear. The tricky part is figuring out how "detective" and "reactive" fit in. I'll have to make an educated guess on this one.
upvoted 0 times
...
Rasheeda
5 months ago
Hmm, I'm a bit confused by the terminology here. I'm not familiar with "detective" and "reactive" access controls. I'll need to think this through carefully.
upvoted 0 times
...
Deonna
5 months ago
This looks like a straightforward access control question. I'll start by identifying the different types of access control methods listed and then try to match them to the answer choices.
upvoted 0 times
...
Corazon
5 months ago
Hmm, this one seems tricky. I'll need to think carefully about what the asg perf -v -p command actually outputs.
upvoted 0 times
...
Annice
5 months ago
Okay, I think I've got a handle on this. I'll need to weigh the potential benefits of each approach against the potential risks to the project.
upvoted 0 times
...
Abel
5 months ago
Okay, I've got a strategy - I'll focus on the HA-group threshold and score to determine the most likely outcome.
upvoted 0 times
...
Thomasena
5 months ago
I know central banks provide liquidity, but isn't financial intermediation more about the overall system connecting savers and borrowers?
upvoted 0 times
...
Nana
10 months ago
Wait, 'detective' access control? Is that like having a private eye check if I'm authorized or something? C seems like the way to go.
upvoted 0 times
Haydee
9 months ago
User 3: Preventive access control is also important to stop unauthorized access before it happens.
upvoted 0 times
...
Ryan
9 months ago
User 2: Yeah, it's all about keeping an eye on things. C is definitely the right choice.
upvoted 0 times
...
Latosha
10 months ago
User 1: Detective access control is more about monitoring and detecting unauthorized access.
upvoted 0 times
...
...
Maurine
10 months ago
Haha, 'virtual' access control? What is this, the Matrix? I'm confident C is the right choice here.
upvoted 0 times
...
Leigha
10 months ago
Aha! 'Reactive' as an access control - that's a new one. But I'm pretty sure the right answer is C.
upvoted 0 times
...
Marcos
10 months ago
Hmm, 'virtual' as an access control method? That's a bit of a stretch. I'm going with C as well.
upvoted 0 times
Nu
9 months ago
I think C is the best choice, it covers the most common access control methods.
upvoted 0 times
...
Yesenia
9 months ago
I'm not so sure about virtual access control, but I think Detective, Physical, and Preventive methods are important.
upvoted 0 times
...
Suzan
9 months ago
I agree, it's a convenient method for managing access to systems remotely.
upvoted 0 times
...
Selma
10 months ago
I think virtual access control is becoming more common nowadays.
upvoted 0 times
...
...
Tesha
10 months ago
I think the correct answer is C) 1, 2 and 5. Physical and preventive controls make sense, but 'detective' is a new one for me.
upvoted 0 times
Jules
10 months ago
Yes, you're correct. Detective controls involve monitoring and analyzing security events to identify potential security incidents.
upvoted 0 times
...
Tiffiny
10 months ago
Detective controls are used to detect security incidents, while physical controls restrict access to physical areas. Preventive controls are put in place to prevent security incidents.
upvoted 0 times
...
...
Avery
10 months ago
I believe the correct answer is option C) 1, 2 and 5. Detective, physical, and preventive controls are essential for securing data.
upvoted 0 times
...
Herman
10 months ago
I agree with you, Lashawn. Those methods can help prevent unauthorized access to sensitive information.
upvoted 0 times
...
Lashawn
11 months ago
I think the different methods for access controls are detective, physical, and virtual.
upvoted 0 times
...

Save Cancel